A web application firewall inspects requests and filters those that are deemed malicious. In comparison, Client Reputation focuses on the source of the request, and determines the extent to which that source has sent malicious requests in the past. Register today for this upcoming webcast to find out more!

SC Magazine's SC Congress returns to London on 3 March, 2015 with an all new programme! Here is your chance to catch a full day of hard-hitting information security news and solutions from leaders in their industries that you can implement for your company.

As employees increasingly have mobile access to the corporate network this webcast will discuss the steps organisations can take to minimise risk among their workforce and detail what a mobile device management policy should look like and how to enforce it. Register today for this SC editorial webcast!

US district court Judge Jon Tigar, sitting in San Francisco, dismissed the case because the plaintiff, Texas resident Kathleen Haskins, failed to demonstrate that the product she purchased was among those impacted by the breach, according to court documents. The dismissal was made following a motion filed by Symantec.

It wasn't until January 2012 that California-based Symantec confirmed that hackers had accessed a portion of its source code in 2006, which impacted versions of four products released that year: Norton AntiVirus Corporate Edition, Norton Internet Security, Norton SystemWorks and pcAnywhere.

In April, Haskins filed a lawsuit on behalf of herself and other affected Symantec customers who didn't receive a “fully functional” product.

Tigar ruled last Friday however, that the product mentioned in her complaint, Norton AntiVirus, was different than those determined to be compromised. He also found that she didn't adequately explain the relationship between it and the impacted products.

“[The] plaintiff cannot assert standing on her own behalf without clearly alleging that the product she purchased was among those that form the basis of her claim,” the order dismissing the suit said. “[The] plaintiff has not demonstrated her standing to bring this action, and the complaint must be dismissed.”

Tigar said that Haskins can file an amended complaint within 21 days of the order, if it contains additional facts absent in the current one.

SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.